Analysis
-
max time kernel
149s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
24/11/2023, 23:10
Static task
static1
Behavioral task
behavioral1
Sample
46662c3c7ba67f606336249de3469a1954ce87a0cac6d7cd37adcc46b2147b53.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
46662c3c7ba67f606336249de3469a1954ce87a0cac6d7cd37adcc46b2147b53.exe
Resource
win10v2004-20231023-en
General
-
Target
46662c3c7ba67f606336249de3469a1954ce87a0cac6d7cd37adcc46b2147b53.exe
-
Size
53KB
-
MD5
57b9314acd1bbd7a9edac75056a9966f
-
SHA1
7233a3c31b5add992e1a6e53877a21cbf672803c
-
SHA256
46662c3c7ba67f606336249de3469a1954ce87a0cac6d7cd37adcc46b2147b53
-
SHA512
a484a1ec10bb6cf26d21c518851c64f711a3ed3db426b90ca5065a94afa8d0a2279ddb9363e236c01ed7c1077ec3da0c996aabbeb17c8a730b5d6f201aec6adc
-
SSDEEP
1536:c331fgLdQAQfwt7FZJ92BsooAYPJwPo5y7:cn1ftffepVPJAYPJwg5Q
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2076 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2652 Logo1_.exe 2844 46662c3c7ba67f606336249de3469a1954ce87a0cac6d7cd37adcc46b2147b53.exe -
Loads dropped DLL 1 IoCs
pid Process 2076 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\EXPEDITN\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\SaslPrep\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\nl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\Shared\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\brx\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\modules\locale\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\fr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.feature_1.1.0.v20140827-1444\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\it-IT\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\InfoPath.en-us\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\PROFILE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\Presentation Designs\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\crashreporter.exe Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Help\2052\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateOnDemand.exe Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Swirl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\SpringGreen\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sk\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Adobe\Help\en_US\Adobe Reader\9.0\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\Download\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\fonts\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VBA\VBA7\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\PROOF\3082\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\it-IT\css\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\config\Modules\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\bn\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\ktab.exe Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Checkers\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\REFINED\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\it-IT\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\ja\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\my\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Backgammon\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\mn\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Desert\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBBA\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\CAPSULES\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Minesweeper\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Etc\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Hearts\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\gd\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\MSInfo\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Stationery\1033\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Runtime\x86\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\chrome_pwa_launcher.exe Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\kinit.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\http\requests\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Mozilla Maintenance Service\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\it-IT\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 46662c3c7ba67f606336249de3469a1954ce87a0cac6d7cd37adcc46b2147b53.exe File created C:\Windows\Logo1_.exe 46662c3c7ba67f606336249de3469a1954ce87a0cac6d7cd37adcc46b2147b53.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2652 Logo1_.exe 2652 Logo1_.exe 2652 Logo1_.exe 2652 Logo1_.exe 2652 Logo1_.exe 2652 Logo1_.exe 2652 Logo1_.exe 2652 Logo1_.exe 2652 Logo1_.exe 2652 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 460 wrote to memory of 2076 460 46662c3c7ba67f606336249de3469a1954ce87a0cac6d7cd37adcc46b2147b53.exe 28 PID 460 wrote to memory of 2076 460 46662c3c7ba67f606336249de3469a1954ce87a0cac6d7cd37adcc46b2147b53.exe 28 PID 460 wrote to memory of 2076 460 46662c3c7ba67f606336249de3469a1954ce87a0cac6d7cd37adcc46b2147b53.exe 28 PID 460 wrote to memory of 2076 460 46662c3c7ba67f606336249de3469a1954ce87a0cac6d7cd37adcc46b2147b53.exe 28 PID 460 wrote to memory of 2652 460 46662c3c7ba67f606336249de3469a1954ce87a0cac6d7cd37adcc46b2147b53.exe 29 PID 460 wrote to memory of 2652 460 46662c3c7ba67f606336249de3469a1954ce87a0cac6d7cd37adcc46b2147b53.exe 29 PID 460 wrote to memory of 2652 460 46662c3c7ba67f606336249de3469a1954ce87a0cac6d7cd37adcc46b2147b53.exe 29 PID 460 wrote to memory of 2652 460 46662c3c7ba67f606336249de3469a1954ce87a0cac6d7cd37adcc46b2147b53.exe 29 PID 2652 wrote to memory of 2604 2652 Logo1_.exe 30 PID 2652 wrote to memory of 2604 2652 Logo1_.exe 30 PID 2652 wrote to memory of 2604 2652 Logo1_.exe 30 PID 2652 wrote to memory of 2604 2652 Logo1_.exe 30 PID 2604 wrote to memory of 2744 2604 net.exe 33 PID 2604 wrote to memory of 2744 2604 net.exe 33 PID 2604 wrote to memory of 2744 2604 net.exe 33 PID 2604 wrote to memory of 2744 2604 net.exe 33 PID 2076 wrote to memory of 2844 2076 cmd.exe 34 PID 2076 wrote to memory of 2844 2076 cmd.exe 34 PID 2076 wrote to memory of 2844 2076 cmd.exe 34 PID 2076 wrote to memory of 2844 2076 cmd.exe 34 PID 2652 wrote to memory of 1288 2652 Logo1_.exe 14 PID 2652 wrote to memory of 1288 2652 Logo1_.exe 14
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1288
-
C:\Users\Admin\AppData\Local\Temp\46662c3c7ba67f606336249de3469a1954ce87a0cac6d7cd37adcc46b2147b53.exe"C:\Users\Admin\AppData\Local\Temp\46662c3c7ba67f606336249de3469a1954ce87a0cac6d7cd37adcc46b2147b53.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:460 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a4B14.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Users\Admin\AppData\Local\Temp\46662c3c7ba67f606336249de3469a1954ce87a0cac6d7cd37adcc46b2147b53.exe"C:\Users\Admin\AppData\Local\Temp\46662c3c7ba67f606336249de3469a1954ce87a0cac6d7cd37adcc46b2147b53.exe"4⤵
- Executes dropped EXE
PID:2844
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2744
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD5f4248ef43978b9abee5a392ad8a53570
SHA1a76be5ee8ce18dcbb9beb7039ac212c33dcdfa8c
SHA25603bb5c0f3c63de1ffe74ef992b0b5445904095250291b9678f342ff684babf02
SHA512c43850d304970d194b548d384d31fc49afcb350bc6067f9eabbe3f7279c55815d600adee262b7ede9e86596b46cdac96756d5abdb305dcd854b96a0c6d165ad3
-
Filesize
471KB
MD51a0dbecba0dbb963c2f3b0448796d47a
SHA15c0b5d378d3614fe984ce2915b5720886992da0c
SHA2561ea2fb84177a921bc3df4763c3da53a970e192f93f6175d09696ded019e50cf8
SHA5128e25dc08fa6f280a6bc1ccacb1ce665ab055b5d539f8915915fc7536c90185a221cb0c50a02d34b521b871b8487a155b9c40a5f25df87306e1df24ca7e96da25
-
Filesize
722B
MD59c947f8b2b49c964298028b409c9ceda
SHA1d32267fc4ed6e5850a941b1bafebaba530db5dcd
SHA256dfc8eaa8cb303934bc508518cf4e11448114479827c9af4612bfd30c7e5bafaa
SHA5124d1d46f9db7f92166e030fb8ff06133b59f226a67d7ed6466aed3e3100a68546395c525c45efcb6f903e7769d362f60d9095f7c129bb90144bd159881ae2ad11
-
Filesize
722B
MD59c947f8b2b49c964298028b409c9ceda
SHA1d32267fc4ed6e5850a941b1bafebaba530db5dcd
SHA256dfc8eaa8cb303934bc508518cf4e11448114479827c9af4612bfd30c7e5bafaa
SHA5124d1d46f9db7f92166e030fb8ff06133b59f226a67d7ed6466aed3e3100a68546395c525c45efcb6f903e7769d362f60d9095f7c129bb90144bd159881ae2ad11
-
C:\Users\Admin\AppData\Local\Temp\46662c3c7ba67f606336249de3469a1954ce87a0cac6d7cd37adcc46b2147b53.exe
Filesize27KB
MD5827a092884efbae20acbaa713a5c87c5
SHA13edac2e7b2f1adc6701ccc14a99f8050e73eb7b6
SHA25677ed5d76c4185fa34b444b99859c80d4f5773c4c5a76fecca12abea40f749046
SHA51225943ce74ea644a7e8a1ceb8157008c39475eec97d5f3bb1d73538f33b1a3ca6cd7cb89f81f15a0239bea35999cb949b8854db4c80f0eb2cf3ff0c2243974731
-
C:\Users\Admin\AppData\Local\Temp\46662c3c7ba67f606336249de3469a1954ce87a0cac6d7cd37adcc46b2147b53.exe.exe
Filesize27KB
MD5827a092884efbae20acbaa713a5c87c5
SHA13edac2e7b2f1adc6701ccc14a99f8050e73eb7b6
SHA25677ed5d76c4185fa34b444b99859c80d4f5773c4c5a76fecca12abea40f749046
SHA51225943ce74ea644a7e8a1ceb8157008c39475eec97d5f3bb1d73538f33b1a3ca6cd7cb89f81f15a0239bea35999cb949b8854db4c80f0eb2cf3ff0c2243974731
-
Filesize
26KB
MD5934cdf8e20087ae21c328ff42ebb5cb4
SHA1758db62111fd17fd95c8afcec7f1f459b0b3e14b
SHA25608ddf63525bc6bd142a44d29a82d6a81a137e35757513edc9a61a4d7e422834c
SHA5128cf66624e6937f7a5028dba3428348fa4e9be98f138f132ea0e5577585be1ca7fefefaa1375456caf27962c9cf63cc305228097421e62bcc520c4c5d4177385c
-
Filesize
26KB
MD5934cdf8e20087ae21c328ff42ebb5cb4
SHA1758db62111fd17fd95c8afcec7f1f459b0b3e14b
SHA25608ddf63525bc6bd142a44d29a82d6a81a137e35757513edc9a61a4d7e422834c
SHA5128cf66624e6937f7a5028dba3428348fa4e9be98f138f132ea0e5577585be1ca7fefefaa1375456caf27962c9cf63cc305228097421e62bcc520c4c5d4177385c
-
Filesize
26KB
MD5934cdf8e20087ae21c328ff42ebb5cb4
SHA1758db62111fd17fd95c8afcec7f1f459b0b3e14b
SHA25608ddf63525bc6bd142a44d29a82d6a81a137e35757513edc9a61a4d7e422834c
SHA5128cf66624e6937f7a5028dba3428348fa4e9be98f138f132ea0e5577585be1ca7fefefaa1375456caf27962c9cf63cc305228097421e62bcc520c4c5d4177385c
-
Filesize
26KB
MD5934cdf8e20087ae21c328ff42ebb5cb4
SHA1758db62111fd17fd95c8afcec7f1f459b0b3e14b
SHA25608ddf63525bc6bd142a44d29a82d6a81a137e35757513edc9a61a4d7e422834c
SHA5128cf66624e6937f7a5028dba3428348fa4e9be98f138f132ea0e5577585be1ca7fefefaa1375456caf27962c9cf63cc305228097421e62bcc520c4c5d4177385c
-
Filesize
10B
MD50d897ff63d6d70834691031400f75fba
SHA11527f718ccce51339d233a1a409fbc4a27fe73d6
SHA2564ae6beff7729c454ddd8204bac0ebeaf452455e43ffb2e7e6fef227f1ad09169
SHA5126cdd19fa414b78c81ac442e75cb85fc7ec97444b80373cd4de0ca20b72f7a6a474589d44202ab04d7a493f2c202ab60951c51d031a4ff95f5a878fa93039794d
-
\Users\Admin\AppData\Local\Temp\46662c3c7ba67f606336249de3469a1954ce87a0cac6d7cd37adcc46b2147b53.exe
Filesize27KB
MD5827a092884efbae20acbaa713a5c87c5
SHA13edac2e7b2f1adc6701ccc14a99f8050e73eb7b6
SHA25677ed5d76c4185fa34b444b99859c80d4f5773c4c5a76fecca12abea40f749046
SHA51225943ce74ea644a7e8a1ceb8157008c39475eec97d5f3bb1d73538f33b1a3ca6cd7cb89f81f15a0239bea35999cb949b8854db4c80f0eb2cf3ff0c2243974731